Operating System - HP-UX
1833776 Members
2523 Online
110063 Solutions
New Discussion

OpenSSH_3.1p1 not connecting to cisco devices??

 
Tony Escujuri_1
Advisor

OpenSSH_3.1p1 not connecting to cisco devices??

I'm trying to connect to cisco devices and I not sure what I need in the ssh_config file. any help would be great. THANKS:

# $OpenBSD: ssh_config,v 1.12 2002/01/16 17:55:33 stevesk Exp $
# This is the ssh client system-wide configuration file. See ssh(1)
# for more information. This file provides defaults for users, and
# the values can be changed in per-user configuration files or on the
# command line.
# The strategy used for options in the default sshd_config shipped with
# HP-UX Secure Shell is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
# Configuration data is parsed as follows:
# 1. command line options
# 2. user-specific file
# 3. system-wide file
# Any configuration value is only changed the first time it is set.
# Thus, host-specific definitions should be at the beginning of the
# configuration file, and defaults at the end.
# Site-wide defaults for various options
#Host *
#ForwardAgent yes
#ForwardX11 yes
#RhostsAuthentication yes
#RhostsRSAAuthentication yes
#RSAAuthentication yes
#PasswordAuthentication yes
# FallBackToRsh no
# UseRsh no
# BatchMode no
# CheckHostIP yes
#StrictHostKeyChecking ask
#IdentityFile ~/.ssh/identity
#IdentityFile ~/.ssh/id_rsa
#IdentityFile ~/.ssh/id_dsa
#Port 22
# WARNING: enabling protocol 1 will cause HP-UX Secure Shell vulnerable
# to security attacks. It is strongly recommended NOT to enable protocol 1.
# Use "2,1" to notify ssh to use version 2 and fall back to version 1 if
# version 2 is not available. The default is "2".
Protocol 1
#Cipher des
#Cipher 3des
# Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
#EscapeChar ~


######Debug out:

# ssh -v -v -v 10.xxx.77.146
OpenSSH_3.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f
debug1: Reading configuration data /opt/ssh/etc/ssh_config
debug3: Seeing PRNG from /opt/ssh/libexec/ssh-rand-helper
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 0 geteuid 0 anon 1
debug1: Connecting to 10.xxx.77.146 [10.xxx.77.146] port 22.
debug1: temporarily_use_uid: 0/3 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 0/3 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: read PEM private key done: type RSA
debug1: identity file /root/.ssh/identity type -1
ssh_exchange_identification: Connection closed by remote host
debug1: Calling cleanup 0x40011aca(0x0)

Help!
I don't know very much!
1 REPLY 1
Tony Escujuri_1
Advisor

Re: OpenSSH_3.1p1 not connecting to cisco devices??

Here is the new debug out from the following command used trying to access the cisco devices:

$ ssh -vvv -1 -c des 10.xxx.77.146
OpenSSH_3.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f
debug1: Reading configuration data /opt/ssh/etc/ssh_config
debug1: Applying options for *
debug3: Seeing PRNG from /opt/ssh/libexec/ssh-rand-helper
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 102 geteuid 0 anon 1
debug1: Connecting to 10.xxx.77.146 [10.xxx.77.146] port 22.
debug1: temporarily_use_uid: 102/5150 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 102/5150 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: read PEM private key done: type RSA
debug1: identity file /home/nccuser/.ssh/identity type 0
ssh_exchange_identification: Connection closed by remote host
debug1: Calling cleanup 0x40011aca(0x0)

Here is the current ssh_config we are running. Is there something we need to change to this file so that we can connect to the cisco devices running ssh.15/1.25 via des??


# strings ssh_config
# $OpenBSD: ssh_config,v 1.12 2002/01/16 17:55:33 stevesk Exp $
# This is the ssh client system-wide configuration file. See ssh(1)
# for more information. This file provides defaults for users, and
# the values can be changed in per-user configuration files or on the
# command line.
# The strategy used for options in the default sshd_config shipped with
# HP-UX Secure Shell is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
# Configuration data is parsed as follows:
# 1. command line options
# 2. user-specific file
# 3. system-wide file
# Any configuration value is only changed the first time it is set.
# Thus, host-specific definitions should be at the beginning of the
# configuration file, and defaults at the end.
# Site-wide defaults for various options
Host *
ForwardAgent yes
ForwardX11 yes
# RhostsAuthentication yes
# RhostsRSAAuthentication yes
# RSAAuthentication yes
PasswordAuthentication yes
# FallBackToRsh no
# UseRsh no
# BatchMode no
# CheckHostIP yes
# StrictHostKeyChecking ask
IdentityFile ~/.ssh/identity
# IdentityFile ~/.ssh/id_rsa
# IdentityFile ~/.ssh/id_dsa
Port 22
# WARNING: enabling protocol 1 will cause HP-UX Secure Shell vulnerable
# to security attacks. It is strongly recommended NOT to enable protocol 1.
# Use "2,1" to notify ssh to use version 2 and fall back to version 1 if
# version 2 is not available. The default is "2".
Protocol 1
Cipher des
# Cipher 3des
# Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
# EscapeChar ~

TIA!!

Regards,
Tony Escujuri
I don't know very much!